Achieve New Updated (September) Fortinet NSE5 Examination questions Topic 1, Volume A part 04

Ensurepass

QUESTION 31  (Topic 1)

 

An administrator wants to assign a set of UTM features to a group of users. Which of the following is the correct method for doing this?

 

A.

Enable a set of unique UTM profiles under “Edit User Group”.

B.

The administrator must enable the UTM profiles in an identity-based policy applicable to the user group.

 

 

 

 

C.

When defining the UTM objects, the administrator must list the user groups which will use the UTM object.

D.

The administrator must apply the UTM features directly to a user object.

 

Answer: B

 

 

QUESTION 32  (Topic 1)

 

A client can establish a secure connection to a corporate network using SSL VPN in tunnel mode.

 

Which of the following statements are correct regarding the use of tunnel mode SSL VPN? (Select all that apply.)

 

A.

Split tunneling can be enabled when using tunnel mode SSL VPN.

B.

Client software is required to be able to use a tunnel mode SSL VPN.

C.

Users attempting to create a tunnel mode SSL VPN connection must be authenticated by at least one SSL VPN policy.

D.

The source IP address used by the client for the tunnel mode SSL VPN is assigned by the FortiGate unit.

 

Answer: ABCD

 

 

QUESTION 33  (Topic 1)

 

Which of the following statements are true of the FortiGate unit’s factory default configuration?

 

A.

`Port1′ or `Internal’ interface will have an IP of 192.168.1.99.

B.

`Port1′ or `Internal’ interface will have a DHCP server set up and enabled (on devices that support DHCP Servers).

C.

Default login will always be the username: admin (all lowercase) and no password.

D.

The implicit firewall action is ACCEPT.

 

Answer: ABC

 

 

QUESTION 34  (Topic 1)

 

 

 

 

Which of the following are valid authentication user group types on a FortiGate unit? (Select all that apply.)

 

A.

Firewall

B.

Directory Service

C.

Local

D.

LDAP

E.

PKI

 

Answer: AB

 

 

QUESTION 35  (Topic 1)

 

Which of the following items does NOT support the Logging feature?

 

A.

File Filter

B.

Application control

C.

Session timeouts

D.

Administrator activities

E.

Web URL filtering

 

Answer: C

 

 

QUESTION 36  (Topic 1)

 

Each UTM feature has configurable UTM objects such as sensors, profiles or lists that define how the feature will function. How are UTM features applied to traffic?

 

A.

One or more UTM features are enabled in a firewall policy.

B.

In the system configuration for that UTM feature, you can identify the policies to which the feature is to be applied.

C.

Enable the appropriate UTM objects and identify one of them as the default.

D.

For each UTM object, identify which policy will use it.

 

Answer: A

 

 

QUESTION 37  (Topic 1)

 

 

 

 

You wish to create a firewall policy that applies only to traffic intended for your web server. The web server has an IP address of 192.168.2.2 and a /24 subnet mask. When defining the firewall address for use in this policy, which one of the following addresses is correct?

 

A.

192.168.2.0 / 255.255.255.0

B.

192.168.2.2 / 255.255.255.0

C.

192.168.2.0 / 255.255.255.255

D.

192.168.2.2 / 255.255.255.255

 

Answer: D

 

 

QUESTION 38  (Topic 1)

 

An end user logs into the full-access SSL VPN portal and selects the Tunnel Mode option by clicking on the “Connect” button. The administrator has enabled split tunneling.

 

clip_image002

 

Given that the user authenticates against the SSL VPN policy shown in the image below, which statement below identifies the route that is added to the client’s routing table.

 

A.

A route to destination matching the `WIN2K3′ address object.

B.

A route to the destination matching the `all’ address object.

C.

A default route.

D.

No route is added.

 

Answer: A

 

 

QUESTION 39  (Topic 1)

 

Which of the following methods can be used to access the CLI? (Select all that apply.)

 

 

 

 

 

A.

By using a direct connection to a serial console.

B.

By using the CLI console window in Web Config.

C.

By using an SSH connection.

D.

By using a Telnet connection.

 

Answer: ABCD

 

 

QUESTION 40  (Topic 1)

 

The ordering of firewall policies is very important. Policies can be re-ordered within the FortiGate Web Config and also using the CLI. The command used in the CLI to perform this function is __________.

 

A.

set order

B.

edit policy

C.

reorder

D.

move

 

Answer: D

 

< strong>Free VCE & PDF File for Fortinet NSE5 Real Exam

Instant Access to Free VCE Files: CompTIA | VMware | SAP …
Instant Access to Free PDF Files: CompTIA | VMware | SAP …

This entry was posted in NSE5 Examination questions (September) and tagged , , , , , , . Bookmark the permalink.